Prerequisites

Before you start deploying, you may want to see if you’re meeting all the prerequisites for deployment. Ensure that you have:

  1. Kubernetes Cluster available with given system requirements.
  2. Installed Azure CLI on your client machine.

    Once you install the Azure CLI on your client machine, follow the steps given on the page Connecting to AKS cluster.
  3. Installed Kubernetes Kubectl CLI on your client machine.
  4. Installed Helm CLI 3.1 or above on your client machine.
  5. Administrator rights on the Kubernetes cluster level. 
  6. Set up two databases to host Adeptia backend and log database with given system requirements.
  7. The database that meets the following requirements:
    1. It is accessible through TCP/IP. The port must be fixed and opened.
    2. You have the below database permissions for Adeptia backend and log database.

      Database

      Authentication mode

      Ensure that you have permission to

      MS SQL server

      Use SQL authentication mode only.

      CREATE TABLE, ADD COLUMN, CREATE INDEX, DROP COLUMN, DROP INDEX, DROP TABLE, CREATE PROCEDURE, ALTER PROCEDURE, EXECUTE, and DROP PROCEDURE for SQL Server database.

      OracleUse Oracle authentication mode only.

      CREATE SESSION, CREATE TABLE, CREATE ANY TABLE, ALTER ANY TABLE, DROP ANY TABLE, DELETE ANY TABLE, SELECT ANY TABLE, UPDATE ANY TABLE, INSERT ANY TABLE, CREATE ANY INDEX, ALTER ANY INDEX, DROP ANY INDEX, CREATE PROCEDURE, CREATE ANY PROCEDURE, ALTER ANY PROCEDURE, DROP ANY PROCEDURE, EXECUTE ANY PROCEDURE, CREATE VIEW, CREATE ANY VIEW.

      Refer to the following script to create a User/Schema with required permissions in Oracle database.

      Script for Backend Database
      create user <Name of the User/Schema> identified by "<Password>";
      ALTER USER <Name of the User/Schema> quota unlimited on USERS;
      GRANT CREATE SESSION TO <Name of the User/Schema>;
      GRANT CREATE TABLE TO <Name of the User/Schema>;
      GRANT CREATE ANY TABLE TO <Name of the User/Schema>;
      GRANT ALTER ANY TABLE TO <Name of the User/Schema>;
      GRANT DROP ANY TABLE TO <Name of the User/Schema>;
      GRANT DELETE ANY TABLE TO <Name of the User/Schema>;
      GRANT SELECT ANY TABLE TO <Name of the User/Schema>;
      GRANT UPDATE ANY TABLE TO <Name of the User/Schema>;
      GRANT INSERT ANY TABLE TO <Name of the User/Schema>;
      GRANT CREATE ANY INDEX TO <Name of the User/Schema>;
      GRANT ALTER ANY INDEX TO <Name of the User/Schema>;
      GRANT DROP ANY INDEX TO <Name of the User/Schema>;
      GRANT CREATE PROCEDURE TO <Name of the User/Schema>;
      GRANT CREATE ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT ALTER ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT DROP ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT EXECUTE ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT CREATE VIEW TO <Name of the User/Schema>;
      GRANT CREATE ANY VIEW TO <Name of the User/Schema>;
      
      
      
      Script for Log Database
      create user <Name of the User/Schema> identified by "<Password>";
      ALTER USER <Name of the User/Schema> quota unlimited on USERS;
      GRANT CREATE SESSION TO <Name of the User/Schema>;
      GRANT CREATE TABLE TO <Name of the User/Schema>;
      GRANT CREATE ANY TABLE TO <Name of the User/Schema>;
      GRANT ALTER ANY TABLE TO <Name of the User/Schema>;
      GRANT DROP ANY TABLE TO <Name of the User/Schema>;
      GRANT DELETE ANY TABLE TO <Name of the User/Schema>;
      GRANT SELECT ANY TABLE TO <Name of the User/Schema>;
      GRANT UPDATE ANY TABLE TO <Name of the User/Schema>;
      GRANT INSERT ANY TABLE TO <Name of the User/Schema>;
      GRANT CREATE ANY INDEX TO <Name of the User/Schema>;
      GRANT ALTER ANY INDEX TO <Name of the User/Schema>;
      GRANT DROP ANY INDEX TO <Name of the User/Schema>;
      GRANT CREATE PROCEDURE TO <Name of the User/Schema>;
      GRANT CREATE ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT ALTER ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT DROP ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT EXECUTE ANY PROCEDURE TO <Name of the User/Schema>;
      GRANT CREATE VIEW TO <Name of the User/Schema>;
      GRANT CREATE ANY VIEW TO <Name of the User/Schema>;
      MySQL or Azure MySQLUse MySQL/Azure MySQL authentication mode only.

      CREATE, DROP, INDEX, ALTER, SELECT, DELETE, INSERT, UPDATE, REFERENCES, CREATE ROUTINE, CREATE VIEW.

      Important

      In case you are using Azure MySQL database, set the server parameter log_bin_trust_function_creators to 1 to assign the required set of permissions to a custom user. Refer to this document for more details.
  8. Whitelist https://connect.adeptia.com/ in the firewall for incoming and outgoing traffic for using business applications such as QuickBooks, Salesforce, or any other.